]>
Commit | Line | Data |
---|---|---|
cc73685d CB |
1 | /* SPDX-License-Identifier: LGPL-2.1+ */ |
2 | ||
f1a4a029 ÇO |
3 | #ifndef __LXC_CONF_H |
4 | #define __LXC_CONF_H | |
0ad19a3f | 5 | |
d38dd64a CB |
6 | #ifndef _GNU_SOURCE |
7 | #define _GNU_SOURCE 1 | |
8 | #endif | |
9e99997b | 9 | #include <linux/magic.h> |
74a2b586 | 10 | #include <net/if.h> |
1a0e70ac | 11 | #include <netinet/in.h> |
d38dd64a CB |
12 | #include <stdbool.h> |
13 | #include <stdio.h> | |
b0a33c1e | 14 | #include <sys/param.h> |
8173e600 | 15 | #include <sys/types.h> |
9e99997b CB |
16 | #include <sys/vfs.h> |
17 | ||
d7f19646 | 18 | #include "compiler.h" |
d38dd64a | 19 | #include "config.h" |
f2363e38 | 20 | #include "list.h" |
c3e3c21a | 21 | #include "lxcseccomp.h" |
732375f5 | 22 | #include "ringbuf.h" |
d38dd64a | 23 | #include "start.h" |
0ed9b1bc | 24 | #include "terminal.h" |
e3b4c4c4 | 25 | |
d38dd64a CB |
26 | #if HAVE_SYS_RESOURCE_H |
27 | #include <sys/resource.h> | |
28 | #endif | |
29 | ||
769872f9 SH |
30 | #if HAVE_SCMP_FILTER_CTX |
31 | typedef void * scmp_filter_ctx; | |
32 | #endif | |
33 | ||
97e9cfa0 SH |
34 | /* worth moving to configure.ac? */ |
35 | #define subuidfile "/etc/subuid" | |
36 | #define subgidfile "/etc/subgid" | |
37 | ||
0ad19a3f | 38 | /* |
43654d34 CB |
39 | * Defines a generic struct to configure the control group. It is up to the |
40 | * programmer to specify the right subsystem. | |
ec64264d | 41 | * @subsystem : the targeted subsystem |
576f946d | 42 | * @value : the value to set |
54860ed0 CB |
43 | * @version : The version of the cgroup filesystem on which the controller |
44 | * resides. | |
43654d34 CB |
45 | * |
46 | * @controllers : The controllers to use for this container. | |
47 | * @dir : The name of the directory containing the container's cgroup. | |
48 | * Not that this is a per-container setting. | |
0ad19a3f | 49 | */ |
50 | struct lxc_cgroup { | |
43654d34 CB |
51 | union { |
52 | /* information about a specific controller */ | |
53 | struct /* controller */ { | |
54860ed0 | 54 | int version; |
43654d34 CB |
55 | char *subsystem; |
56 | char *value; | |
57 | }; | |
58 | ||
59 | /* meta information about cgroup configuration */ | |
60 | struct /* meta */ { | |
61 | char *controllers; | |
62 | char *dir; | |
a900cbaf WB |
63 | char *monitor_dir; |
64 | char *container_dir; | |
65 | char *namespace_dir; | |
9caee129 | 66 | bool relative; |
43654d34 CB |
67 | }; |
68 | }; | |
0ad19a3f | 69 | }; |
70 | ||
c6d09e15 | 71 | #if !HAVE_SYS_RESOURCE_H |
3a0e314d | 72 | #define RLIM_INFINITY ((unsigned long)-1) |
c6d09e15 WB |
73 | struct rlimit { |
74 | unsigned long rlim_cur; | |
75 | unsigned long rlim_max; | |
76 | }; | |
77 | #endif | |
3a0e314d | 78 | |
c6d09e15 WB |
79 | /* |
80 | * Defines a structure to configure resource limits to set via setrlimit(). | |
81 | * @resource : the resource name in lowercase without the RLIMIT_ prefix | |
82 | * @limit : the limit to set | |
83 | */ | |
84 | struct lxc_limit { | |
85 | char *resource; | |
86 | struct rlimit limit; | |
87 | }; | |
88 | ||
f6d3e3e4 SH |
89 | enum idtype { |
90 | ID_TYPE_UID, | |
91 | ID_TYPE_GID | |
92 | }; | |
93 | ||
7edd0540 L |
94 | /* |
95 | * Defines a structure to configure kernel parameters at runtime. | |
96 | * @key : the kernel parameters will be configured without the "lxc.sysctl" prefix | |
97 | * @value : the value to set | |
98 | */ | |
99 | struct lxc_sysctl { | |
100 | char *key; | |
101 | char *value; | |
102 | }; | |
103 | ||
61d7a733 YT |
104 | /* |
105 | * Defines a structure to configure proc filesystem at runtime. | |
106 | * @filename : the proc filesystem will be configured without the "lxc.proc" prefix | |
107 | * @value : the value to set | |
108 | */ | |
109 | struct lxc_proc { | |
110 | char *filename; | |
111 | char *value; | |
112 | }; | |
113 | ||
f6d3e3e4 SH |
114 | /* |
115 | * id_map is an id map entry. Form in confile is: | |
bdcbb6b3 CB |
116 | * lxc.idmap = u 0 9800 100 |
117 | * lxc.idmap = u 1000 9900 100 | |
118 | * lxc.idmap = g 0 9800 100 | |
119 | * lxc.idmap = g 1000 9900 100 | |
251d0d2a DE |
120 | * meaning the container can use uids and gids 0-99 and 1000-1099, |
121 | * with [ug]id 0 mapping to [ug]id 9800 on the host, and [ug]id 1000 to | |
122 | * [ug]id 9900 on the host. | |
f6d3e3e4 SH |
123 | */ |
124 | struct id_map { | |
125 | enum idtype idtype; | |
251d0d2a | 126 | unsigned long hostid, nsid, range; |
f6d3e3e4 SH |
127 | }; |
128 | ||
0e4be3cf | 129 | /* Defines the number of tty configured and contains the |
a589434e | 130 | * instantiated ptys |
885766f5 | 131 | * @max = number of configured ttys |
b0a33c1e | 132 | */ |
133 | struct lxc_tty_info { | |
885766f5 CB |
134 | size_t max; |
135 | char *dir; | |
136 | char *tty_names; | |
2520facd | 137 | struct lxc_terminal_info *tty; |
b0a33c1e | 138 | }; |
139 | ||
13bb312d | 140 | /* Defines a structure to store the rootfs location, the |
33fcb7a0 | 141 | * optionals pivot_root, rootfs mount paths |
59bb8698 SH |
142 | * @path : the rootfs source (directory or device) |
143 | * @mount : where it is mounted | |
b3b8c97f | 144 | * @bev_type : optional backing store type |
3437f95c CB |
145 | * @options : mount options |
146 | * @mountflags : the portion of @options that are flags | |
b98318f4 | 147 | * @data : the portion of @options that are not flags |
6e54330c | 148 | * @managed : whether it is managed by LXC |
33fcb7a0 DL |
149 | */ |
150 | struct lxc_rootfs { | |
151 | char *path; | |
23b7ea69 | 152 | char *mount; |
b3b8c97f | 153 | char *bdev_type; |
3437f95c CB |
154 | char *options; |
155 | unsigned long mountflags; | |
156 | char *data; | |
6e54330c | 157 | bool managed; |
33fcb7a0 DL |
158 | }; |
159 | ||
368bbc02 CS |
160 | /* |
161 | * Automatic mounts for LXC to perform inside the container | |
162 | */ | |
163 | enum { | |
3a0e314d CB |
164 | LXC_AUTO_PROC_RW = 0x001, /* /proc read-write */ |
165 | LXC_AUTO_PROC_MIXED = 0x002, /* /proc/sys and /proc/sysrq-trigger read-only */ | |
b06b8511 CS |
166 | LXC_AUTO_PROC_MASK = 0x003, |
167 | ||
3a0e314d CB |
168 | LXC_AUTO_SYS_RW = 0x004, /* /sys */ |
169 | LXC_AUTO_SYS_RO = 0x008, /* /sys read-only */ | |
170 | LXC_AUTO_SYS_MIXED = 0x00C, /* /sys read-only and /sys/class/net read-write */ | |
b06b8511 CS |
171 | LXC_AUTO_SYS_MASK = 0x00C, |
172 | ||
3a0e314d CB |
173 | LXC_AUTO_CGROUP_RO = 0x010, /* /sys/fs/cgroup (partial mount, read-only) */ |
174 | LXC_AUTO_CGROUP_RW = 0x020, /* /sys/fs/cgroup (partial mount, read-write) */ | |
175 | LXC_AUTO_CGROUP_MIXED = 0x030, /* /sys/fs/cgroup (partial mount, paths r/o, cgroup r/w) */ | |
176 | LXC_AUTO_CGROUP_FULL_RO = 0x040, /* /sys/fs/cgroup (full mount, read-only) */ | |
177 | LXC_AUTO_CGROUP_FULL_RW = 0x050, /* /sys/fs/cgroup (full mount, read-write) */ | |
178 | LXC_AUTO_CGROUP_FULL_MIXED = 0x060, /* /sys/fs/cgroup (full mount, parent r/o, own r/w) */ | |
179 | /* | |
180 | * These are defined in such a way as to retain binary compatibility | |
181 | * with earlier versions of this code. If the previous mask is applied, | |
182 | * both of these will default back to the _MIXED variants, which is | |
183 | * safe. | |
184 | */ | |
185 | LXC_AUTO_CGROUP_NOSPEC = 0x0B0, /* /sys/fs/cgroup (partial mount, r/w or mixed, depending on caps) */ | |
186 | LXC_AUTO_CGROUP_FULL_NOSPEC = 0x0E0, /* /sys/fs/cgroup (full mount, r/w or mixed, depending on caps) */ | |
187 | LXC_AUTO_CGROUP_FORCE = 0x100, /* mount cgroups even when cgroup namespaces are supported */ | |
188 | LXC_AUTO_CGROUP_MASK = 0x1F0, /* all known cgroup options, doe not contain LXC_AUTO_CGROUP_FORCE */ | |
adf0ba1f LT |
189 | |
190 | LXC_AUTO_SHMOUNTS = 0x200, /* shared mount point */ | |
191 | LXC_AUTO_SHMOUNTS_MASK = 0x200, /* shared mount point mask */ | |
3a0e314d | 192 | LXC_AUTO_ALL_MASK = 0x1FF, /* all known settings */ |
368bbc02 CS |
193 | }; |
194 | ||
26ddeedd | 195 | enum lxchooks { |
1a0e70ac CB |
196 | LXCHOOK_PRESTART, |
197 | LXCHOOK_PREMOUNT, | |
198 | LXCHOOK_MOUNT, | |
199 | LXCHOOK_AUTODEV, | |
200 | LXCHOOK_START, | |
201 | LXCHOOK_STOP, | |
202 | LXCHOOK_POSTSTOP, | |
203 | LXCHOOK_CLONE, | |
204 | LXCHOOK_DESTROY, | |
08dd2805 | 205 | LXCHOOK_START_HOST, |
1a0e70ac CB |
206 | NUM_LXC_HOOKS |
207 | }; | |
72d0e1cb | 208 | |
59eac805 | 209 | __hidden extern char *lxchook_names[NUM_LXC_HOOKS]; |
7b35f3d6 | 210 | |
d39b10eb CB |
211 | struct lxc_state_client { |
212 | int clientfd; | |
213 | lxc_state_t states[MAX_STATE]; | |
214 | }; | |
215 | ||
fda39d45 | 216 | enum { |
356e71c6 | 217 | LXC_BPF_DEVICE_CGROUP_LOCAL_RULE = -1, |
29a01c37 CB |
218 | LXC_BPF_DEVICE_CGROUP_ALLOWLIST = 0, |
219 | LXC_BPF_DEVICE_CGROUP_DENYLIST = 1, | |
fda39d45 CB |
220 | }; |
221 | ||
4bfb655e CB |
222 | struct device_item { |
223 | char type; | |
224 | int major; | |
225 | int minor; | |
226 | char access[4]; | |
227 | int allow; | |
fda39d45 CB |
228 | /* |
229 | * LXC_BPF_DEVICE_CGROUP_LOCAL_RULE -> no global rule | |
29a01c37 CB |
230 | * LXC_BPF_DEVICE_CGROUP_ALLOWLIST -> allowlist (deny all) |
231 | * LXC_BPF_DEVICE_CGROUP_DENYLIST -> denylist (allow all) | |
2a63b5cb CB |
232 | */ |
233 | int global_rule; | |
4bfb655e CB |
234 | }; |
235 | ||
70fd7fc9 CB |
236 | struct timens_offsets { |
237 | /* Currently, either s_boot or ns_boot is set, but not both. */ | |
238 | int64_t s_boot; | |
239 | int64_t ns_boot; | |
240 | ||
241 | /* Currently, either s_monotonic or ns_monotonic is set, but not both. */ | |
242 | int64_t s_monotonic; | |
243 | int64_t ns_monotonic; | |
244 | }; | |
245 | ||
571e6ec8 | 246 | struct lxc_conf { |
c7b17051 CB |
247 | /* Pointer to the name of the container. Do not free! */ |
248 | const char *name; | |
07c4ea31 | 249 | bool is_execute; |
91480a0f | 250 | int reboot; |
9b8e3c96 | 251 | signed long personality; |
571e6ec8 | 252 | struct utsname *utsname; |
edd64e17 | 253 | |
54860ed0 CB |
254 | struct { |
255 | struct lxc_list cgroup; | |
256 | struct lxc_list cgroup2; | |
bf651989 | 257 | struct bpf_program *cgroup2_devices; |
4bfb655e CB |
258 | /* This should be reimplemented as a hashmap. */ |
259 | struct lxc_list devices; | |
54860ed0 | 260 | }; |
edd64e17 | 261 | |
46ad64ab CB |
262 | struct { |
263 | struct lxc_list id_map; | |
c7e345ae | 264 | |
edd64e17 CB |
265 | /* |
266 | * Pointer to the idmap entry for the container's root uid in | |
267 | * the id_map list. Do not free! | |
268 | */ | |
5173b710 | 269 | const struct id_map *root_nsuid_map; |
c7e345ae | 270 | |
edd64e17 CB |
271 | /* |
272 | * Pointer to the idmap entry for the container's root gid in | |
273 | * the id_map list. Do not free! | |
274 | */ | |
5173b710 | 275 | const struct id_map *root_nsgid_map; |
46ad64ab | 276 | }; |
edd64e17 | 277 | |
5f4535a3 | 278 | struct lxc_list network; |
448d7b0c CB |
279 | |
280 | struct { | |
281 | char *fstab; | |
282 | int auto_mounts; | |
283 | struct lxc_list mount_list; | |
284 | }; | |
285 | ||
81810dd1 | 286 | struct lxc_list caps; |
1fb86a7c | 287 | struct lxc_list keepcaps; |
885766f5 | 288 | |
a2db71c0 | 289 | /* /dev/tty<idx> devices */ |
885766f5 | 290 | struct lxc_tty_info ttys; |
a2db71c0 CB |
291 | /* /dev/console device */ |
292 | struct lxc_terminal console; | |
293 | /* maximum pty devices allowed by devpts mount */ | |
e528c735 | 294 | size_t pty_max; |
f797f05e CB |
295 | /* file descriptor for the container's /dev/pts mount */ |
296 | int devpts_fd; | |
885766f5 | 297 | |
32fd6cf3 CB |
298 | /* set to true when rootfs has been setup */ |
299 | bool rootfs_setup; | |
33fcb7a0 | 300 | struct lxc_rootfs rootfs; |
32fd6cf3 | 301 | |
b3187a81 | 302 | bool close_all_fds; |
44ae0fb6 CB |
303 | |
304 | struct { | |
305 | unsigned int hooks_version; | |
306 | struct lxc_list hooks[NUM_LXC_HOOKS]; | |
307 | }; | |
4a85ce2a | 308 | |
fe4de9a6 | 309 | char *lsm_aa_profile; |
1800f924 WB |
310 | char *lsm_aa_profile_computed; |
311 | bool lsm_aa_profile_created; | |
312 | unsigned int lsm_aa_allow_nesting; | |
a56e2df9 | 313 | unsigned int lsm_aa_allow_incomplete; |
1800f924 | 314 | struct lxc_list lsm_aa_raw; |
fe4de9a6 | 315 | char *lsm_se_context; |
4fef78bc | 316 | char *lsm_se_keyring_context; |
8f818a84 | 317 | bool keyring_disable_session; |
7a0bcca3 | 318 | bool tmp_umount_proc; |
c3e3c21a | 319 | struct lxc_seccomp seccomp; |
72d0e1cb | 320 | int maincmd_fd; |
1a0e70ac | 321 | unsigned int autodev; /* if 1, mount and fill a /dev at start */ |
63012bdd | 322 | int autodevtmpfssize; /* size of the /dev tmpfs */ |
1a0e70ac CB |
323 | int haltsignal; /* signal used to halt container */ |
324 | int rebootsignal; /* signal used to reboot container */ | |
325 | int stopsignal; /* signal used to hard stop container */ | |
326 | char *rcfile; /* Copy of the top level rcfile we read */ | |
327 | ||
b9949538 | 328 | /* Logfile and loglevel can be set in a container config file. Those |
7b660465 | 329 | * function as defaults. The defaults can be overridden by command line. |
1a0e70ac CB |
330 | * However we don't want the command line specified values to be saved |
331 | * on c->save_config(). So we store the config file specified values | |
332 | * here. */ | |
98020c31 JS |
333 | char *logfile; /* the logfile as specified in config */ |
334 | int loglevel; /* loglevel as specified in config (if any) */ | |
858377e4 | 335 | int logfd; |
9f30a190 | 336 | |
3590152f CB |
337 | unsigned int start_auto; |
338 | unsigned int start_delay; | |
ee1e7aa0 SG |
339 | int start_order; |
340 | struct lxc_list groups; | |
76a26f55 | 341 | int nbd_idx; |
35120d9c | 342 | |
a8dfe4e0 | 343 | /* unshare the mount namespace in the monitor */ |
226dc30e | 344 | unsigned int monitor_unshare; |
258f8051 | 345 | unsigned int monitor_signal_pdeath; |
a8dfe4e0 | 346 | |
f979ac15 SH |
347 | /* list of included files */ |
348 | struct lxc_list includes; | |
4184c3e1 SH |
349 | /* config entries which are not "lxc.*" are aliens */ |
350 | struct lxc_list aliens; | |
7c661726 MP |
351 | |
352 | /* list of environment variables we'll add to the container when | |
353 | * started */ | |
354 | struct lxc_list environment; | |
6b0d5538 SH |
355 | |
356 | /* text representation of the config file */ | |
357 | char *unexpanded_config; | |
32fd6cf3 CB |
358 | size_t unexpanded_len; |
359 | size_t unexpanded_alloced; | |
67c660d0 | 360 | |
5cda27c1 SH |
361 | /* default command for lxc-execute */ |
362 | char *execute_cmd; | |
363 | ||
67c660d0 SG |
364 | /* init command */ |
365 | char *init_cmd; | |
56f8ff00 | 366 | |
72bb04e4 PT |
367 | /* if running in a new user namespace, the UID/GID that init and COMMAND |
368 | * should run under when using lxc-execute */ | |
c5cd20ce PT |
369 | uid_t init_uid; |
370 | gid_t init_gid; | |
8796becf CB |
371 | |
372 | /* indicator if the container will be destroyed on shutdown */ | |
66ffdb1a | 373 | unsigned int ephemeral; |
76d0127f CB |
374 | |
375 | /* The facility to pass to syslog. Let's users establish as what type of | |
376 | * program liblxc is supposed to write to the syslog. */ | |
377 | char *syslog; | |
5a46f283 CB |
378 | |
379 | /* Whether PR_SET_NO_NEW_PRIVS will be set for the container. */ | |
380 | bool no_new_privs; | |
c6d09e15 WB |
381 | |
382 | /* RLIMIT_* limits */ | |
383 | struct lxc_list limits; | |
7ec2e32a | 384 | |
43654d34 CB |
385 | /* Contains generic info about the cgroup configuration for this |
386 | * container. Note that struct lxc_cgroup contains a union. It is only | |
387 | * valid to access the members of the anonymous "meta" struct within | |
388 | * that union. | |
389 | */ | |
390 | struct lxc_cgroup cgroup_meta; | |
28d9e29e | 391 | |
b074bbf1 | 392 | struct { |
1d8d3676 | 393 | int ns_clone; |
abeb5bba | 394 | int ns_keep; |
b074bbf1 CB |
395 | char *ns_share[LXC_NS_MAX]; |
396 | }; | |
3c491553 L |
397 | |
398 | /* init working directory */ | |
9e132956 | 399 | char *init_cwd; |
3c491553 | 400 | |
d39b10eb CB |
401 | /* A list of clients registered to be informed about a container state. */ |
402 | struct lxc_list state_clients; | |
7edd0540 L |
403 | |
404 | /* sysctls */ | |
405 | struct lxc_list sysctls; | |
61d7a733 YT |
406 | |
407 | /* procs */ | |
408 | struct lxc_list procs; | |
adf0ba1f | 409 | |
7a41e857 | 410 | struct shmount { |
adf0ba1f LT |
411 | /* Absolute path to the shared mount point on the host */ |
412 | char *path_host; | |
413 | /* Absolute path (in the container) to the shared mount point */ | |
414 | char *path_cont; | |
7a41e857 | 415 | } shmount; |
70fd7fc9 CB |
416 | |
417 | struct timens_offsets timens; | |
571e6ec8 DL |
418 | }; |
419 | ||
efb7e304 CB |
420 | __hidden extern int write_id_mapping(enum idtype idtype, pid_t pid, const char *buf, size_t buf_size) |
421 | __access_r(3, 4); | |
344c9d81 | 422 | |
858377e4 | 423 | #ifdef HAVE_TLS |
d7f19646 | 424 | extern thread_local struct lxc_conf *current_config; |
858377e4 SH |
425 | #else |
426 | extern struct lxc_conf *current_config; | |
427 | #endif | |
428 | ||
efb7e304 CB |
429 | __hidden extern int run_lxc_hooks(const char *name, char *hook, struct lxc_conf *conf, char *argv[]); |
430 | __hidden extern struct lxc_conf *lxc_conf_init(void); | |
431 | __hidden extern void lxc_conf_free(struct lxc_conf *conf); | |
432 | __hidden extern int pin_rootfs(const char *rootfs); | |
433 | __hidden extern int lxc_map_ids(struct lxc_list *idmap, pid_t pid); | |
434 | __hidden extern int lxc_create_tty(const char *name, struct lxc_conf *conf); | |
435 | __hidden extern void lxc_delete_tty(struct lxc_tty_info *ttys); | |
436 | __hidden extern int lxc_clear_config_caps(struct lxc_conf *c); | |
437 | __hidden extern int lxc_clear_config_keepcaps(struct lxc_conf *c); | |
438 | __hidden extern int lxc_clear_cgroups(struct lxc_conf *c, const char *key, int version); | |
439 | __hidden extern int lxc_clear_mount_entries(struct lxc_conf *c); | |
440 | __hidden extern int lxc_clear_automounts(struct lxc_conf *c); | |
441 | __hidden extern int lxc_clear_hooks(struct lxc_conf *c, const char *key); | |
442 | __hidden extern int lxc_clear_idmaps(struct lxc_conf *c); | |
443 | __hidden extern int lxc_clear_groups(struct lxc_conf *c); | |
444 | __hidden extern int lxc_clear_environment(struct lxc_conf *c); | |
445 | __hidden extern int lxc_clear_limits(struct lxc_conf *c, const char *key); | |
446 | __hidden extern int lxc_delete_autodev(struct lxc_handler *handler); | |
447 | __hidden extern int lxc_clear_autodev_tmpfs_size(struct lxc_conf *c); | |
448 | __hidden extern void lxc_clear_includes(struct lxc_conf *conf); | |
449 | __hidden extern int lxc_setup_rootfs_prepare_root(struct lxc_conf *conf, const char *name, | |
450 | const char *lxcpath); | |
451 | __hidden extern int lxc_setup(struct lxc_handler *handler); | |
452 | __hidden extern int lxc_setup_parent(struct lxc_handler *handler); | |
453 | __hidden extern int setup_resource_limits(struct lxc_list *limits, pid_t pid); | |
454 | __hidden extern int find_unmapped_nsid(const struct lxc_conf *conf, enum idtype idtype); | |
455 | __hidden extern int mapped_hostid(unsigned id, const struct lxc_conf *conf, enum idtype idtype); | |
456 | __hidden extern int userns_exec_1(const struct lxc_conf *conf, int (*fn)(void *), void *data, | |
457 | const char *fn_name); | |
458 | __hidden extern int userns_exec_full(struct lxc_conf *conf, int (*fn)(void *), void *data, | |
459 | const char *fn_name); | |
460 | __hidden extern int parse_mntopts(const char *mntopts, unsigned long *mntflags, char **mntdata); | |
461 | __hidden extern int parse_propagationopts(const char *mntopts, unsigned long *pflags); | |
462 | __hidden extern void tmp_proc_unmount(struct lxc_conf *lxc_conf); | |
463 | __hidden extern void turn_into_dependent_mounts(void); | |
464 | __hidden extern void suggest_default_idmap(void); | |
465 | __hidden extern FILE *make_anonymous_mount_file(struct lxc_list *mount, bool include_nesting_helpers); | |
466 | __hidden extern struct lxc_list *sort_cgroup_settings(struct lxc_list *cgroup_settings); | |
467 | __hidden extern unsigned long add_required_remount_flags(const char *s, const char *d, | |
468 | unsigned long flags); | |
469 | __hidden extern int run_script(const char *name, const char *section, const char *script, ...); | |
470 | __hidden extern int run_script_argv(const char *name, unsigned int hook_version, const char *section, | |
471 | const char *script, const char *hookname, char **argsin); | |
472 | __hidden extern int in_caplist(int cap, struct lxc_list *caps); | |
473 | __hidden extern int setup_sysctl_parameters(struct lxc_list *sysctls); | |
474 | __hidden extern int lxc_clear_sysctls(struct lxc_conf *c, const char *key); | |
475 | __hidden extern int setup_proc_filesystem(struct lxc_list *procs, pid_t pid); | |
476 | __hidden extern int lxc_clear_procs(struct lxc_conf *c, const char *key); | |
477 | __hidden extern int lxc_clear_apparmor_raw(struct lxc_conf *c); | |
478 | __hidden extern int lxc_clear_namespace(struct lxc_conf *c); | |
479 | __hidden extern int userns_exec_minimal(const struct lxc_conf *conf, int (*fn_parent)(void *), | |
480 | void *fn_parent_data, int (*fn_child)(void *), | |
481 | void *fn_child_data); | |
482 | __hidden extern int userns_exec_mapped_root(const char *path, int path_fd, | |
483 | const struct lxc_conf *conf); | |
6e1a327a CB |
484 | static inline int chown_mapped_root(const char *path, const struct lxc_conf *conf) |
485 | { | |
486 | return userns_exec_mapped_root(path, -EBADF, conf); | |
487 | } | |
5ae72b98 | 488 | |
1a0e70ac | 489 | #endif /* __LXC_CONF_H */ |